Answer Posted / swarna
Use case:
What to be tested.
Testcase:
How to be tested.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Can u give me explanation about section 508 testcase and Testcase for this section. It need a details checklist for the same Manimozhi
6 what do you like least about testing?
What are the differences between web applications and client and server applications?
Testcases for msword( microsoct office word??
how will the test plan is pepared in ur organisation>?
hi friends, i have completed course and project on insurance domain in mindq testing institution...can any working employee please tell me ,which notes( testing subject notes,project notes)i have to prefer first.i was studied both notes and getting confussion.one of my friend got job throughly only project notes and said that project notes is enough to get job.in which way ,i have to prepare interview( which important topics first ), if you are follow any strategy to interview purpose,pls send me important topics list.
what is system testing? as test eng, what do u do in sys testing? who invoves in sys testing?
How do test documents in a project span across the software development lifecycle?
What is un-installation testing?
What is difference between Bug resolution meeting & Bug Review Committee? Who are participants?
How quickly we need to fix the bug?
I need your help, actually am facing lots of problem in interview am not able to answer in right way what ever questions asked about project. Could you please answer few questions? You must have seen the project I have mention as current project so please help on this, tell me how to explain project in details am prepare on HR module but don’t know how to explain it properly. If you can send me few documents like SRS, and few test case that will help me to get the clear picture, and want ask u what is tier1, tier2, and tier3 in project.
Explain compatibility testing with an example.
What if an organization is growing so fast that fixed testing processes are impossible? What to do in such situations?
How to do security implementation for any URL??